A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps

From MaRDI portal
Publication:2435610

DOI10.1007/s11071-013-0772-4zbMath1281.94084OpenAlexW1997702683WikidataQ114689445 ScholiaQ114689445MaRDI QIDQ2435610

Che-Wei Hsu, Chun-Ta Li, Cheng-Chi Lee

Publication date: 19 February 2014

Published in: Nonlinear Dynamics (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s11071-013-0772-4




Related Items (18)

Cryptanalysis and design of a three-party authenticated key exchange protocol using smart cardProvably secure extended chaotic map-based three-party key agreement protocols using password authenticationA provable privacy-protection system for multi-server environmentRobust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacyChaotic maps-based three-party password-authenticated key agreement schemeImprovement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart cardA new three-party-authenticated key agreement scheme based on chaotic maps without password tableCryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cardsDesign and analysis of a three party password-based authenticated key exchange protocol using extended chaotic mapsAn efficient online/offline ID-based short signature procedure using extended chaotic mapsA novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic mapsDesign and analysis of a chaotic maps-based three-party authenticated key agreement protocolAn extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage servicesAn efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystemImprovement in new three-party-authenticated key agreement scheme based on chaotic maps without password tableAn efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic mapsCryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocolProvably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model



Cites Work


This page was built for publication: A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps